No menu items!
No menu items!
More

    News

    Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

    May 02, 2024NewsroomVulnerability / Android Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be...

    New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw

    A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using...

    Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million

    May 02, 2024NewsroomRansomware / Cyber Crime A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay $16...

    Dropbox Discloses Breach of Digital Signature Service Affecting All Users

    May 02, 2024NewsroomCyber Attack / Data Breach Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified...

    When is One Vulnerability Scanner Not Enough?

    Like antivirus software, vulnerability scans rely on a database of known weaknesses. That's why websites like VirusTotal exist, to give cyber practitioners a chance...

    CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability

    May 02, 2024NewsroomVulnerability / Data Breach The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known...

    New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials

    May 02, 2024NewsroomCyber Espionage / Network Security A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal...

    Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds

    May 01, 2024NewsroomFinancial Crime / Forensic Analysis A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated...

    Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

    May 01, 2024NewsroomMalware / Android Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for...

    Latest articles

    spot_imgspot_img